Gary Utley

Recent Posts

Microsoft Teams vs Skype for Business: How The New Teams Will Be Different

Microsoft Teams and Skype for Business have always had some overlap when it comes to functionality. This has prompted some businesses to choose one solution over another. That is changing, however: Skype for Business is coming to Microsoft Teams.

Increase in Mobile Phishing Attacks Highlight Need for Endpoint Security Solutions

A recent report from Lookout shows that mobile ransomware is on the rise. Mobile devices are frequently the most effective attack vector for cyber criminals looking to infect a business network. Ransomware can be devastating to an organization, grinding business processes to a halt and costing a company in time, money, and reputation. Endpoint security solutions are the answer.

Microsoft Office Teams: Your New, More Collaborative Workspace

 

 

Skype for Business will soon be integrated into Microsoft Office Teams, creating a single collaboration platform. What does that mean for your business? By incorporating Skype for Business’ features, Microsoft Teams can become an even more comprehensive, collaborative environment. A Microsoft Teams upgrade can give your organization everything it needs to facilitate fast, effective communication. 

Microsoft Teams vs Slack: How They Stack Up

In 2013, the cloud-based collaborative tool Slack set its targets on disrupting the enterprise productivity market.  An acronym of "Searchable Log of All Conversation and Knowledge," Slack is an all-in-one cloud-based platform through which employees can quickly communicate and organize. As a freemium product, Slack is used by many small businesses and startups -- but Microsoft Teams is quickly gaining traction as well.

Azure AD vs On premise: Why You Should Switch to Azure Active Directory

Azure Active Directory is Microsoft’s answer to managing the identities that access your network. It’s a single solution that provides a directory service, management of applications, and identity and role protection. Developers have used this tool for years to enforce user policies and rules, as well as to control access to applications. The latest change to Azure Active Directory is that it now can be run in the cloud.

How Office 365 Multi Factor Authentication Simplifies the MFA Process

Today, having a username and password to access an account isn’t enough. Hackers are working hard to steal any credentials they can get; Fortune says they’re selling them for around $15 on the dark web. NBC News says you can pick up an entire identity with everything from social security numbers to bank logins for around $1,200. 

Simplifying App Logins With Single Sign On Solutions

Our lives are complicated, in part, because we have multiple digital tools on multiple devices, each typically with its own password requirements. The solution for most of us is to use the same password across multiple devices. This poses a problem particularly for IT administrators that are tasked with improving cybersecurity. On the flip side, having multiple passwords is not only hard to keep track of, it also results in a lot of password resets and frustration for the end-user. 

Why You Need Dark Web Monitoring In Your Cybersecurity Toolbox

The dark web is real and it’s something that you should be worried about. While there are a lot of different types of cyber threats out there, the dark web is the place where much of the data that is stolen from corporate servers end up. For about $15 you can buy computer logins, and for about a $1,000 you can get a full identity complete with social security numbers.

The Best Solutions For Managing Remote Employees

Small Business Trends lays out the stats for us: around 3.9 million employees spend at least half the week working remotely. While this has been a terrific benefit for employees, there are drawbacks for IT managers. Instead of managing LANs and WANs, we’ve expanded our networks to include multi-device, multi-location, dispersed teams.

What You Need to Know About Mobile Application Management

There has been an evolution in mobile device management from the big stick approach that tries to manage employee personal devices to the more granular mobile application management. Wired had an article on MDM vs. MAM and said, “taking a command-and-control approach to managing mobile devices that are typically owned by employees has turned out to be a misguided strategy.”